Kuwait University

Displaying 1-27 of 27 results

  • White Papers // May 2013

    Integrating Security Concerns into Software Development

    It has become clear in software development that functionality and security must go hand in hand in cases where security concerns are to be incorporated early in stages of design. An essential aspect of such a process is threat modeling that integrates security with functional specification. Such an approach includes...

    Provided By Kuwait University

  • White Papers // Mar 2013

    Data, Text, and Web Mining for Business Intelligence: A Survey

    The information and communication technologies revolution brought a digital world with huge amounts of data available. Enterprises use mining technologies to search vast amounts of data for vital insight and knowledge. Mining tools such as data mining, text mining, and web mining are used to find hidden knowledge in large...

    Provided By Kuwait University

  • White Papers // Feb 2013

    Technology Innovation for SME Growth: A Perception for the Emerging Economies

    Globalization and technological transformations have triggered novel changes in both the developed and developing countries. Technology and entrepreneurship are vital tools used for national economies towards 21st century requirement and growth. Technology based enterprises are specifically smart to policy-makers because of their higher prospective for job creation and wealth-generation through...

    Provided By Kuwait University

  • White Papers // Feb 2013

    Toward Conceptual Specification of Communication Protocols

    Communication Protocols are specified by using either formal or graphical notations. For this purpose, Specification and Description Language (SDL) is a formal language used extensively in telecommunication for development of software and hardware. Its diagrammatic version with complementary Message Sequence Chart (MSC) diagrams provides a description of system communication in...

    Provided By Kuwait University

  • White Papers // Sep 2012

    Wireless Sensor Network (WSN) for Water Monitoring System: Case Study of Kuwait Beaches

    Firstly it is needed to realize Wireless Sensors Networks (WSN); the authors can define it as the most important technologies in the new century. during the last decades there was many achievements especially in the field of micro sensor technology and the low power electronics have made WSNs and the...

    Provided By Kuwait University

  • White Papers // Aug 2012

    Diagrammatization of the Transmission Control Protocol

    With the wide spread of Internet services, developers and users need a greater understanding of the technology of networking. Acquiring a clear understanding of communication protocols is an important step in understanding how a network functions; however, many protocols are complicated, and explaining them can be demanding. In addition, protocols...

    Provided By Kuwait University

  • White Papers // Aug 2012

    Evolutionary Techniques in Synthesis of Multiple-Valued Logic Functions

    The Radix (R) used in Multiple-Valued Logic (MVL) circuits goes beyond the binary case (R = 2). MVLRead Only Memory (ROM), Random Access Memory (RAM), and Digital Signal Processing (DSP) systems have been successfully implemented using Complementary Metal Oxide Semiconductor (CMOS) Technology. The complexity of exact synthesis of MVL circuits...

    Provided By Kuwait University

  • White Papers // May 2012

    An Efficient Priority Packet Scheduling Algorithm for Wireless Sensor Network

    Scheduling real-time and non-real time packets at the sensor nodes is significantly important to reduce processing overhead, energy consumptions, communications bandwidth, and end-to-end data transmission delay of Wireless Sensor Network (WSN). Most of the existing packet scheduling algorithms of WSN use assignments based on First-Come First-Served (FCFS), non-preemptive priority, and...

    Provided By Kuwait University

  • White Papers // Aug 2011

    Analysis and Enhancements of Leader Elections Algorithms in Mobile Ad Hoc Networks

    Mobile Ad Hoc NETworks (MANET), distinct from traditional distributed systems, is dynamic and self-organizing networks. MANET requires a leader to coordinate and organize tasks. The challenge is to have the right election algorithm that chooses the right leader based on various factors in MANET. In this paper, the authors analyze...

    Provided By Kuwait University

  • White Papers // Jul 2011

    Data Aggregation at the Gateways Through Sensors' Tasks Scheduling in Wireless Sensor Networks

    The authors present a novel graph-based model for aggregating sensors' data at the gateways within Wireless Sensor Networks (WSNs), where the proposed graph can act as a mean of guiding and assessing the needed resources for data aggregation. In this study, the authors have modeled all sensors' tasks in a...

    Provided By Kuwait University

  • White Papers // May 2011

    On Security Development Lifecycle: Conceptual Description of Vulnerabilities, Risks, and Threats

    Security Development Lifecycle (SDL) is a software assurance methodology that aims at assisting software developers in improving the security of software production. Typically SDL is described in terms of phases that include requirements and design phases. The Requirements phase embraces consideration of security and privacy at a foundational level. This...

    Provided By Kuwait University

  • White Papers // Apr 2011

    Developing Web Applications

    One approach to developing service-oriented web applications is to transform high-level business models to a composition language that implements business processes with web services. Object-oriented analysis and design and UML-based diagrams are typically used in the software development process. In this paper, the authors propose using flow as a fundamental...

    Provided By Kuwait University

  • White Papers // Mar 2011

    Understanding Total System Assurance: The Case of Mobile Agent-Based Wireless Sensor Network Systems

    Total System Assurance (TSA) deals with assuring the security of all system components by considering all potential risks. This comprehensive approach to system assurance tackles security from multiple points of views, thus ensuring the highest possible level of assurance. In this paper, the authors illustrate the TSA approach by considering...

    Provided By Kuwait University

  • White Papers // Jan 2011

    A New Vision Using Sensor Technology for Environmental Monitoring System in the State of Kuwait

    This paper presents the technology choices for implementing Wireless Sensor Networks (WSN) in the state of Kuwait, which can be used for in-situ environmental monitoring. WSN is an embedded, massively distributed networking paradigm consisting of large number of intelligent and multi-task sensor devices connected mainly via short-range wireless links. The...

    Provided By Kuwait University

  • White Papers // Dec 2010

    Effort and Cost Allocation in Medium to Large Software Development Projects

    The proper allocation of financial and human resources to the various software development activities is a very important and critical task contributing to the success of the software project. To provide a realistic allocation, the manager of a software development project should account for the various activities needed to ensure...

    Provided By Kuwait University

  • White Papers // Apr 2010

    Events Classification in Log Audit

    Information security audit is a monitoring/logging mechanism to ensure compliance with regulations and to detect abnormalities, security breaches, and privacy violations; however, auditing too many events causes overwhelming use of system resources and impacts performance. Consequently, a classification of events is used to prioritize events and configure the log system....

    Provided By Kuwait University

  • White Papers // Mar 2010

    Mathematical Validation of Object-Oriented Class Cohesion Metrics

    Class cohesion is an object-oriented software quality attribute and refers to the extent to which the members of a class are related. Software developers use class cohesion measures to assess the quality of their products and to guide the restructuring of poorly designed classes. Several class cohesion metrics are proposed...

    Provided By Kuwait University

  • White Papers // Jan 2010

    GPRS/EDEG Services Performance Measurements in the State of Kuwait

    GPRS and EDGE are narrowband wireless data services that are deployed by GSM operators to provide higher data rate. This paper provides a set of measurements that are used to evaluate, from user perspective, GPRS and EDGE services in the State of Kuwait. The Measurements are taken in the Alsalam...

    Provided By Kuwait University

  • White Papers // Nov 2009

    Conceptual Model for Communication

    A variety of idealized models of communication systems exist, and all may have something in common. Starting with Shannon's communication model and ending with the OSI model, this paper presents progressively more advanced forms of modeling of communication systems by tying communication models together based on the notion of flow....

    Provided By Kuwait University

  • White Papers // Oct 2009

    Dynamic Election-Based Sensing and Routing in Wireless

    Decentralized protocols offer high adaptability to topology changes prominent in Wireless Sensor Networks (WSN). Protocols resilient to topology changes stemming from nodes dying, being added, relocating or duty cycling, improve network performance in terms of lifetime and percent of events sensed and reported. Topology dependant protocols, such as cluster-based, face...

    Provided By Kuwait University

  • White Papers // Sep 2009

    Personal Information Databases

    One of the most important aspects of security organization is to establish a framework to identify security-significant points where policies and procedures are declared. The (information) security infrastructure comprises entities, processes, and technology. All are participants in handling information, which is the item that needs to be protected. Privacy and...

    Provided By Kuwait University

  • White Papers // Jul 2009

    Local Predecimation With Range Index Communication Parallelization Strategy for Fractal Image Compression on a Cluster of Workstations

    In this paper, the authors have implemented and evaluated the performance of local predecimation with range index communication parallelization strategy for fractal image compression on a beowulf cluster of workstations. The strategy effectively balances the load among workstations. They have evaluated the execution time of LPRI, varying the number of...

    Provided By Kuwait University

  • White Papers // Jun 2009

    Generating State-Based Testing Models for Object-Oriented Framework Interface Classes

    An application framework provides a reusable design and implementation for a family of software systems. Application developers extend the framework to build their particular applications using hooks. Hooks are the places identified to show how to use and customize the framework. Hooks define the Framework Interface Classes (FICs) and the...

    Provided By Kuwait University

  • White Papers // Jun 2009

    An Efficient Algorithm for Computing All Program Forward Static Slices

    Program slicing is the task of finding all statements in a program that directly or indirectly influence the value of a variable occurrence. The set of statements that can affect the value of a variable at some point in a program is called a program backward slice. In several software...

    Provided By Kuwait University

  • White Papers // Dec 2008

    Integrating Hook-Based Object-Oriented Framework Testing Techniques

    Object-oriented frameworks provide reusable design, implementation and testing for a family of software systems that share common features. They are implemented at the framework domain engineering stage and extended at the application engineering stage to build the particular required applications. Places at which the framework is extended are called hooks....

    Provided By Kuwait University

  • White Papers // Dec 2008

    An Efficient Algorithm to Find Broadcast Schedule in Ad Hoc TDMA Networks

    The broadcast scheduling is of fundamental importance and practical concern for ad hoc network performance measures such as the communication delay and the throughput. The scheduling problem on hand involves determination of a collision-free broadcast schedule with the minimum length TDMA frame and the maximum slot utilization by efficient distribution...

    Provided By Kuwait University

  • White Papers // Oct 2008

    On The Relationship Of Information Technology With Other Inputs

    The ability to take advantage of the economic opportunities that are created by the price adjusted performance improvement in IT depends in part on the ability of IT capital to substitute for other inputs in production. To examine substitution of IT capital for other inputs the author adopt a less-well-known...

    Provided By Kuwait University

  • White Papers // Mar 2010

    Mathematical Validation of Object-Oriented Class Cohesion Metrics

    Class cohesion is an object-oriented software quality attribute and refers to the extent to which the members of a class are related. Software developers use class cohesion measures to assess the quality of their products and to guide the restructuring of poorly designed classes. Several class cohesion metrics are proposed...

    Provided By Kuwait University

  • White Papers // Dec 2010

    Effort and Cost Allocation in Medium to Large Software Development Projects

    The proper allocation of financial and human resources to the various software development activities is a very important and critical task contributing to the success of the software project. To provide a realistic allocation, the manager of a software development project should account for the various activities needed to ensure...

    Provided By Kuwait University

  • White Papers // Feb 2013

    Toward Conceptual Specification of Communication Protocols

    Communication Protocols are specified by using either formal or graphical notations. For this purpose, Specification and Description Language (SDL) is a formal language used extensively in telecommunication for development of software and hardware. Its diagrammatic version with complementary Message Sequence Chart (MSC) diagrams provides a description of system communication in...

    Provided By Kuwait University

  • White Papers // Oct 2009

    Dynamic Election-Based Sensing and Routing in Wireless

    Decentralized protocols offer high adaptability to topology changes prominent in Wireless Sensor Networks (WSN). Protocols resilient to topology changes stemming from nodes dying, being added, relocating or duty cycling, improve network performance in terms of lifetime and percent of events sensed and reported. Topology dependant protocols, such as cluster-based, face...

    Provided By Kuwait University

  • White Papers // Dec 2008

    An Efficient Algorithm to Find Broadcast Schedule in Ad Hoc TDMA Networks

    The broadcast scheduling is of fundamental importance and practical concern for ad hoc network performance measures such as the communication delay and the throughput. The scheduling problem on hand involves determination of a collision-free broadcast schedule with the minimum length TDMA frame and the maximum slot utilization by efficient distribution...

    Provided By Kuwait University

  • White Papers // Oct 2008

    On The Relationship Of Information Technology With Other Inputs

    The ability to take advantage of the economic opportunities that are created by the price adjusted performance improvement in IT depends in part on the ability of IT capital to substitute for other inputs in production. To examine substitution of IT capital for other inputs the author adopt a less-well-known...

    Provided By Kuwait University

  • White Papers // Jan 2010

    GPRS/EDEG Services Performance Measurements in the State of Kuwait

    GPRS and EDGE are narrowband wireless data services that are deployed by GSM operators to provide higher data rate. This paper provides a set of measurements that are used to evaluate, from user perspective, GPRS and EDGE services in the State of Kuwait. The Measurements are taken in the Alsalam...

    Provided By Kuwait University

  • White Papers // Jul 2009

    Local Predecimation With Range Index Communication Parallelization Strategy for Fractal Image Compression on a Cluster of Workstations

    In this paper, the authors have implemented and evaluated the performance of local predecimation with range index communication parallelization strategy for fractal image compression on a beowulf cluster of workstations. The strategy effectively balances the load among workstations. They have evaluated the execution time of LPRI, varying the number of...

    Provided By Kuwait University

  • White Papers // Apr 2010

    Events Classification in Log Audit

    Information security audit is a monitoring/logging mechanism to ensure compliance with regulations and to detect abnormalities, security breaches, and privacy violations; however, auditing too many events causes overwhelming use of system resources and impacts performance. Consequently, a classification of events is used to prioritize events and configure the log system....

    Provided By Kuwait University

  • White Papers // Sep 2009

    Personal Information Databases

    One of the most important aspects of security organization is to establish a framework to identify security-significant points where policies and procedures are declared. The (information) security infrastructure comprises entities, processes, and technology. All are participants in handling information, which is the item that needs to be protected. Privacy and...

    Provided By Kuwait University

  • White Papers // Jun 2009

    Generating State-Based Testing Models for Object-Oriented Framework Interface Classes

    An application framework provides a reusable design and implementation for a family of software systems. Application developers extend the framework to build their particular applications using hooks. Hooks are the places identified to show how to use and customize the framework. Hooks define the Framework Interface Classes (FICs) and the...

    Provided By Kuwait University

  • White Papers // Jun 2009

    An Efficient Algorithm for Computing All Program Forward Static Slices

    Program slicing is the task of finding all statements in a program that directly or indirectly influence the value of a variable occurrence. The set of statements that can affect the value of a variable at some point in a program is called a program backward slice. In several software...

    Provided By Kuwait University

  • White Papers // Nov 2009

    Conceptual Model for Communication

    A variety of idealized models of communication systems exist, and all may have something in common. Starting with Shannon's communication model and ending with the OSI model, this paper presents progressively more advanced forms of modeling of communication systems by tying communication models together based on the notion of flow....

    Provided By Kuwait University

  • White Papers // Apr 2011

    Developing Web Applications

    One approach to developing service-oriented web applications is to transform high-level business models to a composition language that implements business processes with web services. Object-oriented analysis and design and UML-based diagrams are typically used in the software development process. In this paper, the authors propose using flow as a fundamental...

    Provided By Kuwait University

  • White Papers // Jan 2011

    A New Vision Using Sensor Technology for Environmental Monitoring System in the State of Kuwait

    This paper presents the technology choices for implementing Wireless Sensor Networks (WSN) in the state of Kuwait, which can be used for in-situ environmental monitoring. WSN is an embedded, massively distributed networking paradigm consisting of large number of intelligent and multi-task sensor devices connected mainly via short-range wireless links. The...

    Provided By Kuwait University

  • White Papers // Jul 2011

    Data Aggregation at the Gateways Through Sensors' Tasks Scheduling in Wireless Sensor Networks

    The authors present a novel graph-based model for aggregating sensors' data at the gateways within Wireless Sensor Networks (WSNs), where the proposed graph can act as a mean of guiding and assessing the needed resources for data aggregation. In this study, the authors have modeled all sensors' tasks in a...

    Provided By Kuwait University

  • White Papers // May 2011

    On Security Development Lifecycle: Conceptual Description of Vulnerabilities, Risks, and Threats

    Security Development Lifecycle (SDL) is a software assurance methodology that aims at assisting software developers in improving the security of software production. Typically SDL is described in terms of phases that include requirements and design phases. The Requirements phase embraces consideration of security and privacy at a foundational level. This...

    Provided By Kuwait University

  • White Papers // Mar 2011

    Understanding Total System Assurance: The Case of Mobile Agent-Based Wireless Sensor Network Systems

    Total System Assurance (TSA) deals with assuring the security of all system components by considering all potential risks. This comprehensive approach to system assurance tackles security from multiple points of views, thus ensuring the highest possible level of assurance. In this paper, the authors illustrate the TSA approach by considering...

    Provided By Kuwait University

  • White Papers // Aug 2012

    Evolutionary Techniques in Synthesis of Multiple-Valued Logic Functions

    The Radix (R) used in Multiple-Valued Logic (MVL) circuits goes beyond the binary case (R = 2). MVLRead Only Memory (ROM), Random Access Memory (RAM), and Digital Signal Processing (DSP) systems have been successfully implemented using Complementary Metal Oxide Semiconductor (CMOS) Technology. The complexity of exact synthesis of MVL circuits...

    Provided By Kuwait University

  • White Papers // Sep 2012

    Wireless Sensor Network (WSN) for Water Monitoring System: Case Study of Kuwait Beaches

    Firstly it is needed to realize Wireless Sensors Networks (WSN); the authors can define it as the most important technologies in the new century. during the last decades there was many achievements especially in the field of micro sensor technology and the low power electronics have made WSNs and the...

    Provided By Kuwait University

  • White Papers // Aug 2012

    Diagrammatization of the Transmission Control Protocol

    With the wide spread of Internet services, developers and users need a greater understanding of the technology of networking. Acquiring a clear understanding of communication protocols is an important step in understanding how a network functions; however, many protocols are complicated, and explaining them can be demanding. In addition, protocols...

    Provided By Kuwait University

  • White Papers // Aug 2011

    Analysis and Enhancements of Leader Elections Algorithms in Mobile Ad Hoc Networks

    Mobile Ad Hoc NETworks (MANET), distinct from traditional distributed systems, is dynamic and self-organizing networks. MANET requires a leader to coordinate and organize tasks. The challenge is to have the right election algorithm that chooses the right leader based on various factors in MANET. In this paper, the authors analyze...

    Provided By Kuwait University

  • White Papers // May 2012

    An Efficient Priority Packet Scheduling Algorithm for Wireless Sensor Network

    Scheduling real-time and non-real time packets at the sensor nodes is significantly important to reduce processing overhead, energy consumptions, communications bandwidth, and end-to-end data transmission delay of Wireless Sensor Network (WSN). Most of the existing packet scheduling algorithms of WSN use assignments based on First-Come First-Served (FCFS), non-preemptive priority, and...

    Provided By Kuwait University

  • White Papers // Dec 2008

    Integrating Hook-Based Object-Oriented Framework Testing Techniques

    Object-oriented frameworks provide reusable design, implementation and testing for a family of software systems that share common features. They are implemented at the framework domain engineering stage and extended at the application engineering stage to build the particular required applications. Places at which the framework is extended are called hooks....

    Provided By Kuwait University

  • White Papers // Mar 2013

    Data, Text, and Web Mining for Business Intelligence: A Survey

    The information and communication technologies revolution brought a digital world with huge amounts of data available. Enterprises use mining technologies to search vast amounts of data for vital insight and knowledge. Mining tools such as data mining, text mining, and web mining are used to find hidden knowledge in large...

    Provided By Kuwait University

  • White Papers // Feb 2013

    Technology Innovation for SME Growth: A Perception for the Emerging Economies

    Globalization and technological transformations have triggered novel changes in both the developed and developing countries. Technology and entrepreneurship are vital tools used for national economies towards 21st century requirement and growth. Technology based enterprises are specifically smart to policy-makers because of their higher prospective for job creation and wealth-generation through...

    Provided By Kuwait University

  • White Papers // May 2013

    Integrating Security Concerns into Software Development

    It has become clear in software development that functionality and security must go hand in hand in cases where security concerns are to be incorporated early in stages of design. An essential aspect of such a process is threat modeling that integrates security with functional specification. Such an approach includes...

    Provided By Kuwait University